Book description
Securing SQL Server: Protecting Your Database from Attackers provides readers with the necessary tools and techniques to help maintain the security of databases within their environment. It begins with a discussion of network security issues, including public versus private IP addresses; accessing an SQL server from home; physical security; and testing network security. The remaining chapters cover database encryption; SQL password security; SQL injection attacks; database backup security; security auditing; and server rights. The Appendix features checklists that database administrators can use to pass external audits.- Named a 2011 Systems Administration Book by InfoSec Reviews
- Author Denny Cherry is an MVP by Microsoft for his expertise in the SQL Server product
- Learn expert techniques to protect your SQL database environment
- Discover how to identify what an intruder accessed or damaged
Table of contents
- Cover Image
- Table of Contents
- Front Matter
- Copyright
- Dedication
- Acknowledgments
- Author Bio
- Introduction
- 1. Securing the Network
- 2. Database Encryption
- 3. SQL Password Security
- 4. Securing the Instance
- 5. Additional Security for an Internet Facing SQL Server and Application
- 6. SQL Injection Attacks
- 7. Database Backup Security
- 8. Auditing for Security
- 9. Server Rights
- A. External Audit Checklists
- Index
Product information
- Title: Securing SQL Server
- Author(s):
- Release date: December 2010
- Publisher(s): Syngress
- ISBN: 9781597496261
You might also like
book
Securing SQL Server, 3rd Edition
SQL server is the most widely-used database platform in the world, and a large percentage of …
book
Microsoft® SQL Server 2012 Unleashed
Buy the print version of¿ and get the eBook version for free! eBook version includes chapters …
video
SQL Server Transparent Data Encryption: Protecting Database Files at Rest
Protect yourself against data theft through unauthorized access to the physical database files and their copies …
book
Securing SQL Server: DBAs Defending the Database
Protect your data from attack by using SQL Server technologies to implement a defense-in-depth strategy for …